Analysis
-
max time kernel
1799s -
max time network
1701s -
platform
windows10-1703_x64 -
resource
win10-20240221-es -
resource tags
arch:x64arch:x86image:win10-20240221-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
28/02/2024, 17:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1136020719617183834/1136020797509599362/Public.bat?ex=65f0afd0&is=65de3ad0&hm=af5990f836df63b2e72da3ea3bfdb72cc517becdf18d78e4d0d34b2470993858&
Resource
win10-20240221-es
General
-
Target
https://cdn.discordapp.com/attachments/1136020719617183834/1136020797509599362/Public.bat?ex=65f0afd0&is=65de3ad0&hm=af5990f836df63b2e72da3ea3bfdb72cc517becdf18d78e4d0d34b2470993858&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133536136638647175" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4728 chrome.exe 4728 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4728 chrome.exe 4728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4308 4728 chrome.exe 72 PID 4728 wrote to memory of 4308 4728 chrome.exe 72 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 5108 4728 chrome.exe 75 PID 4728 wrote to memory of 3592 4728 chrome.exe 74 PID 4728 wrote to memory of 3592 4728 chrome.exe 74 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76 PID 4728 wrote to memory of 4856 4728 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1136020719617183834/1136020797509599362/Public.bat?ex=65f0afd0&is=65de3ad0&hm=af5990f836df63b2e72da3ea3bfdb72cc517becdf18d78e4d0d34b2470993858&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffea9629758,0x7ffea9629768,0x7ffea96297782⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:22⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1808,i,5155413967287281612,18171080427043709502,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ec147e7a4d268a36c995795ba1d5078f
SHA112641d4843ea4eb2a59d0cfa330950c4409d93df
SHA256d26f7b853e3a670927f7c5d304116d9388641da332c7c57b63ca6cc42efe2496
SHA5126e8508bb3f8db1ca041b1cb8b55123011d0b9889a93d8b7afcbb343dae5cae9bcd8bfd5b0e06c982975aab5a6806f6e8cc16e6c23ac82e20a5b499b3c802cd21
-
Filesize
5KB
MD512356c9c1f89773a7ceb9eb1594e0354
SHA1a9a3f5a88c4d776eda7bac3514d203188aa500de
SHA25636eb44011b477f2c2209171210ccbfda47612cdbb408bb022fc9fc6b3aee58e1
SHA512cfa574fff818e89ac5f966ed836b1b3795e3af1df0191bbbb1a20f0c007d2cdf98db73d05eea04c208511366893eaa8b1ea72ec696c6153d2185b1c88e268348
-
Filesize
5KB
MD5296cafd2a355ba8b46a24f08d13853ff
SHA11dd23676afd89a2ea5569e0881dc6340ba64ec5f
SHA25612acc00e64b4e1aec81764c20fc4f16526f8232c7313a3a2001b6a28e57088b3
SHA5124f74d5d2efc2fed8edb7841c5dd6136faae36dd55fec020b6b8c438928c31216baea237d810ef0bef2e550a06bd925f68d125e1ce638150709f44f47e530f91e
-
Filesize
5KB
MD5556e2220d7f68a2ec4714eedf63af3de
SHA125ea45c4b1e61d9658b834db019cadf2a6cdbbd0
SHA256fffe1338fb66485df84fdee84d7850554fc8b26dc94d9d87e45f3846517bb7bd
SHA512f4f2db472811b720e52ef6a9a8df897eaebb7ceb4960ae8867a73c01895567f719c42a2a7d9f9ad47b4a506e6ea2238cbfac277f237558aeb5fcc4e6ea242897
-
Filesize
130KB
MD59fdff065343c972af9fe3babcfaa3890
SHA18b4b897ffb7a8a1e1395622a5d22ef9dddb32e93
SHA256a07f9f179acaf6da085abf17b51d61da53a5049a7e3d4baa171a0e4d14c2308b
SHA5124cd94b2de3db6c003666299926bc15f4495b8573dca0d60517c5f97962146a639c25736938cefc843a175f8ac8509530c4c3084140cb28d67d6d2d366dfe5127
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd